Secure nearest neighbor revisited

In this paper, we investigate the secure nearest neighbor (SNN) problem, in which a client issues an encrypted query point E(q) to a cloud service provider and asks for an encrypted data point in E(D) (the encrypted database) that is closest to the query point, without allowing the server to learn t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Bin Yao, Feifei Li, Xiaokui Xiao
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 744
container_issue
container_start_page 733
container_title
container_volume
creator Bin Yao
Feifei Li
Xiaokui Xiao
description In this paper, we investigate the secure nearest neighbor (SNN) problem, in which a client issues an encrypted query point E(q) to a cloud service provider and asks for an encrypted data point in E(D) (the encrypted database) that is closest to the query point, without allowing the server to learn the plaintexts of the data or the query (and its result). We show that efficient attacks exist for existing SNN methods [21], [15], even though they were claimed to be secure in standard security models (such as indistinguishability under chosen plaintext or ciphertext attacks). We also establish a relationship between the SNN problem and the order-preserving encryption (OPE) problem from the cryptography field [6], [5], and we show that SNN is at least as hard as OPE. Since it is impossible to construct secure OPE schemes in standard security models [6], [5], our results imply that one cannot expect to find the exact (encrypted) nearest neighbor based on only E(q) and E(D). Given this hardness result, we design new SNN methods by asking the server, given only E(q) and E(D), to return a relevant (encrypted) partition E(G) from E(D) (i.e., G ⊆ D), such that that E(G) is guaranteed to contain the answer for the SNN query. Our methods provide customizable tradeoff between efficiency and communication cost, and they are as secure as the encryption scheme E used to encrypt the query and the database, where E can be any well-established encryption schemes.
doi_str_mv 10.1109/ICDE.2013.6544870
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6544870</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6544870</ieee_id><sourcerecordid>6544870</sourcerecordid><originalsourceid>FETCH-LOGICAL-i218t-c9aaea0da721de4da98cd40831f35999012983f31d3eea24a4d4757e1853cd9f3</originalsourceid><addsrcrecordid>eNpNj81KxDAUheMfWMY-gLgZH6Cde3OTJncpddSBgVmo4G6Iza1G_COtgm9vwVl4Nt_ifBw4Sp0i1IjAi1V7uaw1INWNNcY72FMlO4-mcWR4MvZVocnZCnTzcPC_A6ZDVSA0VDXk9bEqh-EFprBBtFCo81vpvrLM3yVkGcaJ6en58SPPs3ynIY0ST9RRH14HKXecqfur5V17U60316v2Yl0ljX6sOg5BAsTgNEYxMbDvogFP2JNlZkDNnnrCSCJBm2CicdYJektd5J5m6uxvN4nI9jOnt5B_trvD9AuHMUOk</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Secure nearest neighbor revisited</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Bin Yao ; Feifei Li ; Xiaokui Xiao</creator><creatorcontrib>Bin Yao ; Feifei Li ; Xiaokui Xiao</creatorcontrib><description>In this paper, we investigate the secure nearest neighbor (SNN) problem, in which a client issues an encrypted query point E(q) to a cloud service provider and asks for an encrypted data point in E(D) (the encrypted database) that is closest to the query point, without allowing the server to learn the plaintexts of the data or the query (and its result). We show that efficient attacks exist for existing SNN methods [21], [15], even though they were claimed to be secure in standard security models (such as indistinguishability under chosen plaintext or ciphertext attacks). We also establish a relationship between the SNN problem and the order-preserving encryption (OPE) problem from the cryptography field [6], [5], and we show that SNN is at least as hard as OPE. Since it is impossible to construct secure OPE schemes in standard security models [6], [5], our results imply that one cannot expect to find the exact (encrypted) nearest neighbor based on only E(q) and E(D). Given this hardness result, we design new SNN methods by asking the server, given only E(q) and E(D), to return a relevant (encrypted) partition E(G) from E(D) (i.e., G ⊆ D), such that that E(G) is guaranteed to contain the answer for the SNN query. Our methods provide customizable tradeoff between efficiency and communication cost, and they are as secure as the encryption scheme E used to encrypt the query and the database, where E can be any well-established encryption schemes.</description><identifier>ISSN: 1063-6382</identifier><identifier>ISBN: 9781467349093</identifier><identifier>ISBN: 1467349097</identifier><identifier>EISSN: 2375-026X</identifier><identifier>EISBN: 9781467349109</identifier><identifier>EISBN: 1467349089</identifier><identifier>EISBN: 1467349100</identifier><identifier>EISBN: 9781467349086</identifier><identifier>DOI: 10.1109/ICDE.2013.6544870</identifier><language>eng</language><publisher>IEEE</publisher><subject>Encryption ; Equations ; Servers</subject><ispartof>2013 IEEE 29th International Conference on Data Engineering (ICDE), 2013, p.733-744</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6544870$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6544870$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Bin Yao</creatorcontrib><creatorcontrib>Feifei Li</creatorcontrib><creatorcontrib>Xiaokui Xiao</creatorcontrib><title>Secure nearest neighbor revisited</title><title>2013 IEEE 29th International Conference on Data Engineering (ICDE)</title><addtitle>ICDE</addtitle><description>In this paper, we investigate the secure nearest neighbor (SNN) problem, in which a client issues an encrypted query point E(q) to a cloud service provider and asks for an encrypted data point in E(D) (the encrypted database) that is closest to the query point, without allowing the server to learn the plaintexts of the data or the query (and its result). We show that efficient attacks exist for existing SNN methods [21], [15], even though they were claimed to be secure in standard security models (such as indistinguishability under chosen plaintext or ciphertext attacks). We also establish a relationship between the SNN problem and the order-preserving encryption (OPE) problem from the cryptography field [6], [5], and we show that SNN is at least as hard as OPE. Since it is impossible to construct secure OPE schemes in standard security models [6], [5], our results imply that one cannot expect to find the exact (encrypted) nearest neighbor based on only E(q) and E(D). Given this hardness result, we design new SNN methods by asking the server, given only E(q) and E(D), to return a relevant (encrypted) partition E(G) from E(D) (i.e., G ⊆ D), such that that E(G) is guaranteed to contain the answer for the SNN query. Our methods provide customizable tradeoff between efficiency and communication cost, and they are as secure as the encryption scheme E used to encrypt the query and the database, where E can be any well-established encryption schemes.</description><subject>Encryption</subject><subject>Equations</subject><subject>Servers</subject><issn>1063-6382</issn><issn>2375-026X</issn><isbn>9781467349093</isbn><isbn>1467349097</isbn><isbn>9781467349109</isbn><isbn>1467349089</isbn><isbn>1467349100</isbn><isbn>9781467349086</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpNj81KxDAUheMfWMY-gLgZH6Cde3OTJncpddSBgVmo4G6Iza1G_COtgm9vwVl4Nt_ifBw4Sp0i1IjAi1V7uaw1INWNNcY72FMlO4-mcWR4MvZVocnZCnTzcPC_A6ZDVSA0VDXk9bEqh-EFprBBtFCo81vpvrLM3yVkGcaJ6en58SPPs3ynIY0ST9RRH14HKXecqfur5V17U60316v2Yl0ljX6sOg5BAsTgNEYxMbDvogFP2JNlZkDNnnrCSCJBm2CicdYJektd5J5m6uxvN4nI9jOnt5B_trvD9AuHMUOk</recordid><startdate>20130101</startdate><enddate>20130101</enddate><creator>Bin Yao</creator><creator>Feifei Li</creator><creator>Xiaokui Xiao</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>20130101</creationdate><title>Secure nearest neighbor revisited</title><author>Bin Yao ; Feifei Li ; Xiaokui Xiao</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i218t-c9aaea0da721de4da98cd40831f35999012983f31d3eea24a4d4757e1853cd9f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Encryption</topic><topic>Equations</topic><topic>Servers</topic><toplevel>online_resources</toplevel><creatorcontrib>Bin Yao</creatorcontrib><creatorcontrib>Feifei Li</creatorcontrib><creatorcontrib>Xiaokui Xiao</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bin Yao</au><au>Feifei Li</au><au>Xiaokui Xiao</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Secure nearest neighbor revisited</atitle><btitle>2013 IEEE 29th International Conference on Data Engineering (ICDE)</btitle><stitle>ICDE</stitle><date>2013-01-01</date><risdate>2013</risdate><spage>733</spage><epage>744</epage><pages>733-744</pages><issn>1063-6382</issn><eissn>2375-026X</eissn><isbn>9781467349093</isbn><isbn>1467349097</isbn><eisbn>9781467349109</eisbn><eisbn>1467349089</eisbn><eisbn>1467349100</eisbn><eisbn>9781467349086</eisbn><abstract>In this paper, we investigate the secure nearest neighbor (SNN) problem, in which a client issues an encrypted query point E(q) to a cloud service provider and asks for an encrypted data point in E(D) (the encrypted database) that is closest to the query point, without allowing the server to learn the plaintexts of the data or the query (and its result). We show that efficient attacks exist for existing SNN methods [21], [15], even though they were claimed to be secure in standard security models (such as indistinguishability under chosen plaintext or ciphertext attacks). We also establish a relationship between the SNN problem and the order-preserving encryption (OPE) problem from the cryptography field [6], [5], and we show that SNN is at least as hard as OPE. Since it is impossible to construct secure OPE schemes in standard security models [6], [5], our results imply that one cannot expect to find the exact (encrypted) nearest neighbor based on only E(q) and E(D). Given this hardness result, we design new SNN methods by asking the server, given only E(q) and E(D), to return a relevant (encrypted) partition E(G) from E(D) (i.e., G ⊆ D), such that that E(G) is guaranteed to contain the answer for the SNN query. Our methods provide customizable tradeoff between efficiency and communication cost, and they are as secure as the encryption scheme E used to encrypt the query and the database, where E can be any well-established encryption schemes.</abstract><pub>IEEE</pub><doi>10.1109/ICDE.2013.6544870</doi><tpages>12</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1063-6382
ispartof 2013 IEEE 29th International Conference on Data Engineering (ICDE), 2013, p.733-744
issn 1063-6382
2375-026X
language eng
recordid cdi_ieee_primary_6544870
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Encryption
Equations
Servers
title Secure nearest neighbor revisited
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T11%3A24%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Secure%20nearest%20neighbor%20revisited&rft.btitle=2013%20IEEE%2029th%20International%20Conference%20on%20Data%20Engineering%20(ICDE)&rft.au=Bin%20Yao&rft.date=2013-01-01&rft.spage=733&rft.epage=744&rft.pages=733-744&rft.issn=1063-6382&rft.eissn=2375-026X&rft.isbn=9781467349093&rft.isbn_list=1467349097&rft_id=info:doi/10.1109/ICDE.2013.6544870&rft_dat=%3Cieee_6IE%3E6544870%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781467349109&rft.eisbn_list=1467349089&rft.eisbn_list=1467349100&rft.eisbn_list=9781467349086&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6544870&rfr_iscdi=true